Top Banner
Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton
36

Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Lecture 2A:The Big Picture,

Application Architecture and Lifecycle

IT 202—Internet ApplicationsBased on notes developed by Morgan Benton

Page 2: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

For Today

How this course fits in the CCS curriculaHistory of Networked ApplicationsThe Big PictureSemester RoadmapInformation Technology Systems Architecture Networked Computing Infrastructure The Internet

Application Development Rationale Acquisition Development Lifecycle

Page 3: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

How does this course fit in?

Supply Chain Management

Databases

Client-servercomputing

InterfaceDesign/Human Factors

MISBPR

E-commerce

Page 4: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Brief History of Computing

4 Major phases: Centralized Time-shared Decentralized Networked

Two points to get from this: See where we’ve come from Guess where we’re going

Page 5: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

What’s an Internet Application?

Three Ingredients:1. Information Technology (e.g. networks)

2. Information Content

3. Applications and Users

Page 6: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Social Applications

Characteristics of User Groups Number of Users Narrowness of purpose Duration of activity Social relationships

Examples of types of groups Individuals Task group/Work group Interest group Citizenry

Page 7: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Styles of Social Applications I

Communication Style Direct vs. Publication dimension (support?) Synchronous (immediate) vs. Asynchronous (deferred) Same place vs. Different place

Synchronous Asynchronous

Same Place Brainstorming, DSS, etc.

Sticky notes

Different Place Chat, videoconferencing

E-mail, message boards

Page 8: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Styles of Social Applications II

Coordination Styles Parallel Pooled Sequential Reciprocal/Reactive

The content of this slide is borrowed from Murray Turoff’s CIS 679 course notes, but based on Coordination Theory which was initially developed by Thomas Malone at MIT’s Sloan School of Business

Page 9: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Types of Social Applications

Remote Conferencing (synchronous)Groupware (async)Discussion Forums/ChatCyberspace Applications Broadcast, mass publication Information Retrieval E-commerce Recommender systems

Page 10: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Information Management

What is information?

Wisdom

Knowledge

Information

Data

Page 11: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Finding Useful Information

Information Search and Retrieval

Push vs. Pull

Automated vs. Personalized

Recommendations

User Control

Page 12: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Information Overload

According to Hiltz and Turoff (1981), users experience the greatest amounts of information overload at intermediate levels of use. New users and more experienced users have lower levels.It is very important to be careful about how information serving is designed

Hiltz, S. R. and Turoff, M. (1981) The Evolution of User Behavior in a Computer Conferencing System. Communications of the ACM 24(11), November 1981

Page 13: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Organizational Applications

Apps are designed to support activity Within departments Across departments, within same organization External to the organization, i.e. with

customers, suppliers, business partners, etc.

Page 14: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Types of Organizational Apps

Transaction Processing Systems (TPS)

Management Information Systems (MIS)

Executive Information Systems (EIS)

Enterprise Resource Planning (ERP)

Decision Support Systems (DSS)

Knowledge Management (KM)

Data Mining (DM)

Page 15: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

E-Commerce Framework

Consumer Business Government

Consumer C2C C2B C2G

Business B2C B2B B2G

Government G2C G2B G2G

Page 16: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Steps in a Sale

Matching buyers and sellers

Negotiating terms and conditions

Consummation

Customer Service

Page 17: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Critical Societal Infrastructure

It is important to understand just how important computing and networked applications have become to the smooth operation of our society

What would happen if there was a sudden failure in networked computing?

Page 18: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

The Productivity Paradox

Despite the obvious hours and days of effort that are saved by computers, it is often hard to see an impact on measures of productivity—i.e. people are working more than ever, not making significantly much more money, etc.

Page 19: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Roadmap for the Semester

Understanding the theory and practice of implementing Internet applications

By the end of the semester you may be able to identify a niche that you would like to pursue for your own career

Page 20: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Information Technology

“…the suite of computing and communications technologies that empower users and organizations to capture, store, communicate, and manipulate information. These technologies provide an infrastructure—those capabilities not specific to any application, but which support all applications—together with the application-specific software.” (Messerschmitt)

Page 21: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Information Content

Networked applications restricted to transmission of bit-encoded info, but MANY types of info can be encoded

On the internet a mime-type code often tells a client program (e.g. web browser, mail client) how to interpret a given bit stream (for more info see RFC’s 2045-2049)

Page 22: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

System Architecture

“…a system is something that puts together building blocks that interact to accomplish some higher-level purpose—a purpose that the building blocks themselves could not individually accomplish. Systems can be social (like an organization) or technical (like a networked computer system).” (Messerschmitt)

Page 23: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Building blocks of a Networked Application Architecture

DatabasesUser

DesktopComputer

The Internet

Server

LAN

Page 24: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Elements of an Architecture

DecompositionFunctionalityInteraction

These elements combine together to form emergent properties—i.e. those properties that only appear because the elements work in unison

Page 25: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Systems Hierarchy

S u b -sys te m A S u b sys te m B S u b sys te m C

S ys tem

Page 26: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Network Infrastructure I

Supports four important capabilities:1. Communication across distance

2. Communication across time

3. Computation and logic

4. Human-Computer Interface

Page 27: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Network Infrastructure II

DatabasesCommunication

AcrossDistance

CommunicationAcrossTime

ComputationAnd

Logic

HumanComputerInterface

Page 28: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Web Host Machine(aka a “server”)

System Layers: An Example

Web Application

Application Server

Web Server

Operating System

e.g. Amazon.com website

PHP, ASP, JSP, ColdFusion, etc.

Apache Web Server, IIS, etc.

Linux, Windows, etc.

…to the Internet…

also relies on other components not shown here,such as a database server, DBMS, etc.

Page 29: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Network Functions

Primarily Communication

Domain Name resolution via DNS (Domain Name Server/Service)

Authorization/Authentication

Reliable packet transmission

Page 30: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Networking Concepts

Topologies Star Mesh Token Ring Combinations

Backbone

Switch

Page 31: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Storage

File Systems

Databases (DBMS) Isolate application from changes in computer

systems Provide standard data handling operations Support multiple applications Provide safety and integrity

Page 32: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Two Different Applications Using the Same Data

Database+

DBMS

SecurityMechanism

ApplicationServers

Page 33: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Intranet/Extranet

SecurityMechanism

= Firewall

Page 34: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

So how do these things get built?

Organizations acquire networked applications in one of three ways: Buy them off-the-shelf Outsource them Build them internally (or some combination of these three)

These decisions are quite complex and there are no hard and fast rules that apply

Page 35: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Application Lifecycle

Requirements Analysis

System Design

Implementation

Building and Testing

Deployment

Maintenance

Retirement

What we’ll do this semester

Page 36: Lecture 2A: The Big Picture, Application Architecture and Lifecycle IT 202—Internet Applications Based on notes developed by Morgan Benton.

Development Methodologies

There are many: waterfall, spiral, evolutionary, prototyping, XP

Each is more or less suited to different situations

Software development is still a young discipline—some estimates are that as many as 80% of all projects are at least partial failures